نتایج جستجو برای: cone penetration test

تعداد نتایج: 881936  

Journal: :Canadian Geotechnical Journal 2021

Cable ploughing is an important technique for burying and protecting offshore cables. The ability to predict the required tow force plough performance essential allow vessel selection project programming. Existing models require calibration against full-scale field testing determine empirical parameters, a requirement that may hinder their use. In this study factors controlling resistance were ...

Journal: :Engineering With Computers 2021

Abstract The continuous cone penetration test (CPT) measurements provide an advantageous liable rapid tool for stratification and soil behavior classification that can be employed in the sustainable design of infrastructures. However, CPT are often interpreted by geotechnical experts because involved complexities uncertainties. In this study, a novel type (SBT) model is developed to identify tr...

Journal: :Journal of endodontics 2001
T G Gound R J Riehm E C Odgaard H Makkawy

A simulated curved root canal in a resin block was enlarged to size 40 and used to compare the depth of accessory cone penetration and weight of obturation occurring with the use of different obturation techniques and spreader-accessory cone combinations. Twelve groups, each consisting of 10 obturations, were created. A conventional lateral condensation technique was used in six groups and a me...

2015
Shamal Faily John McAlaney Claudia Iacob

Penetration testers are required to attack systems to evaluate their security, but without engaging in unethical behaviour while doing so. Despite work on hacker values and studies into security practice, there is little literature devoted to the ethical pressures associated with penetration testing. This paper presents several ethical dilemmas and dimensions associated with penetration testing...

2007
David Lie Mahadev Satyanarayanan

Security researchers and practitioners lack techniques to quantitatively evaluate the strength of security systems against a determined attacker. Currently, evaluation is either qualitative, such as through security certification standards, or ad-hoc, such as through penetration testing and auditing. In this paper, we propose a framework that if applied to security systems, would produce quanti...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید